National Labor Exchange Veterans Jobs

USNLX Veterans Careers

Job Information

Microsoft Corporation Security Analyst II - CTJ - Poly in Redmond, Washington

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

The mission of Microsoft Digital Security & Resilience (DSR) is to enable Microsoft to build the most trusted devices and services, while keeping our company safe and our data protected. ​As part of the Microsoft Security organization, and a steward of Microsoft and our customer’s data, a core function of Microsoft DSR is ensuring the security of every aspect of the business. Microsoft DSR is responsible for company-wide information security and compliance, with a strategic focus on information protection, assessment, awareness, governance, and enterprise business continuity. As customer zero, we deploy and secure these services inside Microsoft and then share best practices with enterprise customers at scale across the globe. We have exciting opportunities for you to innovate, influence, transform, inspire and grow within our organization and we encourage you to apply to learn more! 

The Microsoft Security Response Center (MSRC) is looking for a Security Analyst II for our US Government Cloud. As a Security Analyst II, you will work closely with other cloud and security experts across Microsoft to investigate threats, proactively hunt for compromise, improve and automate processes, develop security tooling and data automation, and contribute your experience and expertise to countless other projects that enhance the security and scalability of our cloud services. You will be a part of defending our customer base focused on identifying new attacks, coordinating large scale response and investigating issues.

MSRC seeks motivated, experienced security professionals to join our team. There are few places in Microsoft that have as much direct impact on as many customers as the Microsoft Security Response Center’s Security Operations Center (SOC) and Incident Response Teams. The SOC within the Microsoft Security Response Center (MSRC) is the front line that defends our customers that use Microsoft's Cloud platform and online services. The government security team further specializes to defend national security objectives supporting the DoD (Department of Defense) and civilian agencies.

The Security Analyst II will be excited about strengthening our cloud defenses and defending customers from emerging security threats. If you are excited about protecting customers, then this opportunity may be for you. We are a fast-paced team that constantly provides new opportunities to learn and grow.

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

Responsibilities

  • Assess threats to the service

  • Perform investigation on suspected vulnerable or compromised assets and services, and analyze log data and other artifacts to determine what occurred.

  • Identify potential issues with detection (e.g., false positives, noise). Analyze potential or actual intrusions identified as a result of monitoring activities. Create detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]).

  • Plan and execute proactive adversary hunt for malicious activity using myriad log sources, network- and host-based tools, and threat intelligence to identify the threat actors and their tools and techniques.

  • Analyze key metrics and key performance indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) and identifies trends in security issues and escalates appropriately. Recommend improvements and/or metrics to address gaps in measurement.

  • Proactively identify and investigate potential issues in controls (e.g., network, identity, etc.). Leverage expertise and team members to address and drive down issues accordingly. Identify and/or recognize patterns and recommend potential mitigation strategies. Identify and raise opportunities for automation to improve efficiency and effectiveness. Create automation as appropriate to drive greater efficiency with high value.

  • Embody our culture and values

Qualifications

Required/Minimum Qualifications:

  • 3+ year(s) of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.

  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirements:

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.

  • Clearance Verification : This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.

  • Microsoft Cloud Background Check : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

  • Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance

Preferred/Additional Qualifications:

  • 3+ years of experience with big data and SIEM solutions such as ArcSight, Splunk, ElasticSearch, Logstash, Azure Data Explorer, Azure Log Analytics, Azure Data Lake, or Azure Sentinel

  • OR 3+ years of experience working with large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebook, Spark, Azure Synapse, R, U-SQL, Python, Splunk, and PowerBI.

  • Knowledge of common security, encryption, and protocols such as encryption, PKI, modern authentication and cloud app authorization architectures and protocols such as SAML or OAUTH.

  • Practical OS (Operating Systems) security/internals knowledge for Linux and/or Windows.

  • Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing, and malware analysis.

  • Experience with the Microsoft cloud and/or stack including O365, Azure, Windows or other Microsoft software/services.

  • Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, etc. are plus.

  • Demonstrated ability to understand and communicate technical details with varying levels of management.

Security Operations Engineering IC3 - The typical base pay range for this role across the U.S. is USD $94,300 - $182,600 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $120,900 - $198,600 per year.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay

#MSFTSecurity #DSR #MSRC

Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations (https://careers.microsoft.com/v2/global/en/accessibility.html) .

DirectEmployers